At the recent ShmooCon conference a researcher presented a LastPass phishing attack that could allow hackers to steal your password.

We discussed several times the importance of password managers such as LastPass, but sometimes hackers could exploit them to launch their attacks.

The security researcher Sean Cassidy has presented on Saturday at the ShmooCon hacker conference in Washington a new phishing attack scheme that could allow an attacker to access all passwords stored by a user of the popular LastPass password manager. Cassidy called LostPass his LastPass phishing attack.

“LostPass works because LastPass displays messages in the browser that attackers can fake. Users can’t tell the difference between a fake LostPass message and the real thing because there is no difference. It’s pixel-for-pixel the same notification and login screen” wrote Cassidy in a blog post.

The LastPass phishing technique could allow an attacker to take over user accounts even if protected by the two-factor authentication.

Cassidy explained that this particular attack is feasible because LastPass is vulnerable to a cross-site request forgery that allows any site to send the application a logout notification.

Cassidy demonstrated how users can be tricked into submitting both their LastPass master password and their 2nd-factor authentication code, the attack method relies on a malicious server and exploits bogus pop-up notifications to fool the victims.

The LastPass phishing attack starts when the user visits a bogus website running javascript code that generates in the victim’s browser a notification informing him he has been logged out of LastPass application. The message appears as legitimate and redirects victims to a fake LastPass login screen.

The fake login page requests the user entering his master password and the 2-factor authentication code, if the victim has enabled it.

When the victim submits the information requested they are sent to a web server controlled by the attacker.

The attacker can use the information to access LastPass’ API and use the credentials to download and decrypt the victim’s password.

Cassidy explained that LastPass, differently from other password managers like KeePass, encourages users to keep an encrypted backup of their password vault on its servers, this choice allows users to sync with multiple devices, but also enlarge their surface of attack. An attacker that is able to access the user’s LastPass login credentials can get a copy of the password file.

“My work comes at LastPass from a different angle: you don’t have access to a LastPass user’s machine. Instead, you trick the user into giving you their credentials.” Cassidy explained.

The researcher reported the issue to LastPass in November, and its experts acknowledged the flaw in December.

LastPass has already released an update that mitigates this kind of phishing scheme avoiding users from being logged out and implemented a security alert to warn users when they’ve entered their master password into a fake LastPass form.

Share On

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer.
Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US.
Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines.
Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.AcceptRead More

Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.